2015
DOI: 10.1016/j.neucom.2014.09.083
|View full text |Cite
|
Sign up to set email alerts
|

PCA filtering and probabilistic SOM for network intrusion detection

Abstract: The growth of the Internet and, consequently, the number of interconnected computers, has exposed significant amounts of information to intruders and attackers. Firewalls aim to detect violations according to a predefined rule-set and usually block potentially dangerous incoming traffic. However, with the evolution of attack techniques, it is more difficult to distinguish anomalies from normal traffic. Different detection approaches have been proposed, including the use of machine learning techniques based on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
62
0
3

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 157 publications
(66 citation statements)
references
References 28 publications
1
62
0
3
Order By: Relevance
“…The results are listed in Table 6. For a method M, M 41 and M 18 in Table 6 denote M with the 41 and 18 features, respectively. It is evident from Table 6 that the performance of each method with the 18 features is better than that with all 1.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The results are listed in Table 6. For a method M, M 41 and M 18 in Table 6 denote M with the 41 and 18 features, respectively. It is evident from Table 6 that the performance of each method with the 18 features is better than that with all 1.…”
Section: Resultsmentioning
confidence: 99%
“…De la Hoz et al [18] applied statistical techniques and the self-organizing map (SOM) approach to detect network anomalies. Two machine learning techniques, principal component analysis (PCA) and Fisher discriminant ratio (FDR), were considered in their work to remove irrelevant features and noises.…”
Section: A Brief Review Of Hybrid Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Para las capas más superficiales de material se consideró una variante del modelo Mohr-Coulomb mediante un comportamiento strain-softening para la degradación de la cohesión en función de la deformación plástica. El ángulo de fricción del material y su cohesión se calibraron en función del esfuerzo de confinamiento utilizando resultados experimentales de ensayos triaxiales homotéticos a deformación constante realizados en materiales granulares gruesos (De la Hoz, 2007).…”
Section: Calibración Del Modelo Constitutivo Bajo Carga Estáticaunclassified
“…Se programó una función FISH (Itasca, 2009) para monitorear la variación del área transversal de la probeta virtual en su parte superior, y de esta forma conocer la variación del esfuerzo vertical actuante en la muestra. El módulo de Young E durante los ensayos virtuales varía en función del esfuerzo de confinamiento efectivo, de acuerdo con la variación propuesta por De la Hoz (2007) replanteada en términos del esfuerzo normal octaédrico: E = 136080(σ oct ) 0.48 , donde E y σ oct están en Pascales. Los ensayos simulados corresponden a los del material P-1 (De la Hoz, 2007), para probetas de 15x30 cm sometidas a esfuerzos de confinamiento de 100, 200 y 400 kPa.…”
Section: Calibración Del Modelo Constitutivo Bajo Carga Estáticaunclassified